TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

OweFS – One-way encrypted file system

50 pointsby nyan4over 9 years ago

12 comments

timmcleanover 9 years ago
Heads up to anyone considering using this: the author wrote their own crypto code[1]. I would recommend against using this until that is fixed... I&#x27;ve already spotted a few vulnerabilities.<p>[1] <a href="https:&#x2F;&#x2F;github.com&#x2F;FedericoCeratto&#x2F;owefs&#x2F;blob&#x2F;master&#x2F;pycryptoenc.py" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;FedericoCeratto&#x2F;owefs&#x2F;blob&#x2F;master&#x2F;pycrypt...</a>
评论 #10913788 未加载
评论 #10913623 未加载
评论 #10913270 未加载
评论 #10913619 未加载
评论 #10913437 未加载
Scaevolusover 9 years ago
This is similar to how Apple&#x27;s iOS File Data Protection works with &quot;Protected Unless Open&quot;: <a href="https:&#x2F;&#x2F;www.apple.com&#x2F;business&#x2F;docs&#x2F;iOS_Security_Guide.pdf" rel="nofollow">https:&#x2F;&#x2F;www.apple.com&#x2F;business&#x2F;docs&#x2F;iOS_Security_Guide.pdf</a><p>&gt; Some files may need to be written while the device is locked. A good example of this is a mail attachment downloading in the background. This behavior is achieved by using asymmetric elliptic curve cryptography (ECDH over Curve25519). The usual per-file key is protected by a key derived using One-Pass Diffie-Hellman Key Agreement as described in NIST SP 800-56A.<p>&gt; The ephemeral public key for the agreement is stored alongside the wrapped per-file key. The KDF is Concatenation Key Derivation Function (Approved Alternative 1) as described in 5.8.1 of NIST SP 800-56A. AlgorithmID is omitted. PartyUInfo and PartyVInfo are the ephemeral and static public keys, respectively. SHA-256 is used as the hashing function. As soon as the file is closed, the per-file key is wiped from memory. To open the file again, the shared secret is re-created using the Protected Unless Open class’s private key and the file’s ephemeral public key; its hash is used to unwrap the per-file key, which is then used to decrypt the file.
detaroover 9 years ago
Looks useful, although it probably will have problems with all kind of applications that do anything more than just writing new files or directly appending to old ones (e.g. those that add to files by writing the changed version to disk and then swapping it in place -&gt; old, already encrypted parts of the changed file would then be encrypted again)
ziedaniel1over 9 years ago
The inability to edit or append to files is not really a fundamental limitation of this approach - it would just require some more bookkeeping. Reading back data, of course, is (by design) impossible.
ipsinover 9 years ago
Nice. I&#x27;d previously written a similar FUSE-based one-way filesystem, but I never did publish it. &quot;Go laziness!&quot;<p>The two applications that caught my eye were &quot;home security cameras&quot; (which the docs allude to) and secure telemetry.<p>You have a device (say, a drone) that logs telemetry data, but if the drone is lost, the data cannot be recovered by a third party without the private key.
vive-la-liberteover 9 years ago
Does anyone know a similar but BSD-like instead of GPLv3 licensed fs?
评论 #10913451 未加载
gkyaover 9 years ago
The first faq paragraph has a typo, he probably wanted to say &quot;Traditional encrypted filesystems <i>cannot</i> proctect&quot;.
评论 #10913421 未加载
doomroboover 9 years ago
Exposing filenames in the clear like that is a significant drawback. I&#x27;m not sure how you could get around it, though.
评论 #10913163 未加载
评论 #10913062 未加载
johnhenryover 9 years ago
I was initially turned off by the title of this thread because &#x27;one-way encryption&#x27; generally refers to hashing and not asymmetric encryption. <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Cryptographic_hash_function" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Cryptographic_hash_function</a>
res0nat0rover 9 years ago
Is this essentially the same thing as encrypted loopback filesystems?<p><a href="http:&#x2F;&#x2F;www.techrepublic.com&#x2F;blog&#x2F;linux-and-open-source&#x2F;create-encrypted-loopback-filesystems-on-linux&#x2F;" rel="nofollow">http:&#x2F;&#x2F;www.techrepublic.com&#x2F;blog&#x2F;linux-and-open-source&#x2F;creat...</a>
评论 #10912984 未加载
评论 #10913548 未加载
ausjkeover 9 years ago
asymmetric key encryption is quite cpu intensive comparing to , say AES256.<p>why not use the asymmetric keypair to guard an AES key, and use AES to do the encryption instead, something like what https is doing.
评论 #10913160 未加载
zhenjlover 9 years ago
Should call it 1fs with the number 1. 1fs.io is even avail!